In Depth
In Depth
-
Financial services providers must better report cybercrime
The recent US Secret Service arrest of alleged cybercriminals shows why financial service companies must proactively disclose... Continue Reading
-
Bank’s web vulnerability shows need for secure programming
A security flaw made cahoot, an online bank in the UK, take its website offline for 10 hours. Take this as a warning not to... Continue Reading
-
Don't close your eyes to workplace stress
IT's long-hours, deadline-driven culture makes it a breeding ground for stress. Both employers and staff could pay a high price... Continue Reading
-
NetApp offers virtualised storage
Network Appliance's microkernel appliance operating system, Data ONTAP, has had virtualisation added in its latest version, 7G. Continue Reading
-
Next move: How can I increase employers' interest?
I used to earn £42,000 a year as a software developer, programming principally in Perl for the Unix platform. Following... Continue Reading
-
Break out of old-school habits to secure Windows
When it comes to security, most Windows administrators follow an old-school programmer's mentality, which keeps them working in crisis management mode. In this column, SearchWindowsSecurity.com reader Al Reust explains how and why administrators ... Continue Reading
-
Enterprise content management systems aim to ease the pressure of compliance
Regulatory compliance requirements are driving demand for IT systems that can secure, store and manage documents and data in a... Continue Reading
-
Highly secure systems work only if they need no input from users
In the second extract from his book, security expert Bruce Schneier argues that no end-user can be trusted to keep systems... Continue Reading
-
Adobe improves collaboration and security features in Acrobat 7
Adobe has improved security, collaboration and integration with enterprise software in the new version of the Acrobat document... Continue Reading
-
Cisco turns to AirDefense for Wi-Fi security
Cisco Systems has claimed that big suppliers' wireless security is not good enough without help form smaller, specialist... Continue Reading
-
Standards struggle in Sun-Microsoft love-in
As Sun Microsystems and Microsoft prepare for an early December unveiling of the first step in their technology collaboration,... Continue Reading
-
64-bit Viagra for workhorse servers
IT managers often think of x86-based servers as no more than PCs with bigger and fancier boxes. But AMD and Intel have breathed... Continue Reading
-
Blue Titan fine tunes SOA tool
Attempting to fine-tune its software for use in business-critical applications, Blue Titan Software will unveil Network Director... Continue Reading
-
Sun's Schwartz details Solaris 10 launch
We grilled Jonathan Schwartz, Sun Microsystems' president and chief operating officer, about open source and Solaris 10, which... Continue Reading
-
Is BT-Infonet another global networking déja vu?
Multinational companies have seen global networking ventures come and go. Now a new one is about to be born, following BT Group's... Continue Reading
-
Meeting notes: 20 October 2004
Beware imposing Draconian penalties and liabilities on your outsourcer supplier, as they will backfire on you. Continue Reading
-
Don’t leave it all to the firewall
Although firewalls form the first line of defence for most companies, it is becoming clear that a layered approach is vital to... Continue Reading
-
Appoint a champion to lead IT to changes
Setting a company-wide strategy for standards, technologies and suppliers can deliver a leaner, meaner business, if you put... Continue Reading
-
C# goes head to head with Java
When resources are tight companies try to limit the number of programming languages they support. Microsoft's C# and Sun's Java... Continue Reading
-
Red Hat joins directory fray with Netscape technology buy
Red Hat’s planned purchase of Netscape Directory Server and Certificate Management System should allow it to compete with Novell,... Continue Reading
-
Manning the breaches
Most companies do not employ staff with information security qualifications and yet they are confident they can cope with any... Continue Reading
-
Swisscom follows trend by re-integrating its internet unit
Combining Bluewin with Swisscom’s fixed-line business will immediately benefit consumers. In the long term, Swisscom will be... Continue Reading
-
Cisco improves security for VoIP phones
Cisco Systems’ CallManager 4.1 includes improved encryption for IP phones and other IP voice devices. This will benefit... Continue Reading
-
Capgemini/Hewitt deal continues HR BPO consolidation
In another sign of industry consolidation, Hewitt Associates will manage Capgemini’s North American human resources (HR)... Continue Reading
-
Process portal - composite not complicated
A process portal can reduce errors and improve customer service by eliminating the need for staff to switch between different... Continue Reading
-
Public sector welcome for open source
IT managers see possibilities for increased flexibility but will not be taking risks following OGC verdict that open source is... Continue Reading
-
Who goes there?
Passwords alone are no longer sufficient, and with the rapid rise in phishing, companies that host valuable assets are seeking... Continue Reading
-
Take control of your staff
How do you make staff aware of the latest social engineering ploys, teach them to protect company data and stop them leaving work... Continue Reading
-
Microsoft joins industry move towards using domain-specific modelling languages
Microsoft has released a programming utility that will allow users of Visual Studio 2005 Team System to create their own visual... Continue Reading
-
Which agency is best for an IT technician?
Which are the best IT agencies to deal with an IT technician with six years' experience including migration of desktops to... Continue Reading
-
Pre-built functionality and ease of use makes PHP beginners' choice
Elegance and power has made PHP a top scripting language. Continue Reading
-
Report warns of skills shortage bombshell
The UK's economy could be damaged within a decade unless employers and educators act now to create a new breed of IT... Continue Reading
-
Thomas Cook joins the network
A giant on paper but Thomas Cook is a collection of SMEs with a critical ICT needs Continue Reading
-
Security breached again at US giants
Two major US corporates have suffered apparent security breaches that are embarrassingly similar to incidents earlier this year. Continue Reading
-
Novell vice-chairman unexpectedly departs
After helping Novell reinvigorate itself last year through the endorsement of Linux and the acquisition of suppleir SuSE Linux,... Continue Reading
-
Protect yourself from meltdown
Invading computer viruses can enslave your PC, destroy your data and ruin your business. Protect yourself from meltdown says... Continue Reading
-
Ease the pain of complying with legislation
There is no way for IT directors to avoid the impact of regulation. Suppliers are of limited help but careful planning can reduce... Continue Reading
-
Get the most from your IP network
Joe O’Halloran sees what you can expect to gain from a single converged network for your voice, video and data requirements Continue Reading
-
IP: The financial benefits
How can you use IP networks to gain financial benefits in addition to taking advantage of sophisticated features? Antony Adshead... Continue Reading
-
Hydratight Sweeney rolls out UK IP infrastructure
Hydratight Sweeney is struck by the benefits of a converged network infrastructure Continue Reading
-
Toyota races for success
In all sectors of manufacturing, it’s absolutely vital to reduce the design to production cycle. Time is literally money. In no... Continue Reading
-
500 Club IT directors to tackle mobile challenges
The management implications of mobility and flexible working will be the topics of the Computer Weekly 500 Club's last two... Continue Reading
-
In-house teams are vital when outsourcing
When leading IT directors met to discuss the criteria for successful outsourcing, the importance of governance and in-house... Continue Reading
-
Time for government to get tough
In an extract from his bestselling book, security expert Bruce Schneier calls for legal reform to curb the activities of hackers... Continue Reading
-
House of Lords ruling increases confusion over IT patents
A ruling in the House of Lords on patents will create more confusion about when companies can enforce patents on technology they... Continue Reading
-
Table helps bosses rate IT courses
The best known universities in the UK are not necessarily the best for training future IT professionals, according to an... Continue Reading
-
The ultimate cost of Borland's latest buy
Ovum analyst Bola Rotibi looks behind Borland's intention to acquires tools supplier TogetherSoft Continue Reading
-
Ballmer bullish on future, bearish on Linux
Microsoft chief executive Steve Ballmer touted his company's vision for a bright future, while casting doubt on alternatives to... Continue Reading
-
Enterprise single sign-on tools are comprehensive but costly
Managing multiple user identities and passwords is difficult for companies and users. ESSO can alleviate the symptoms but adds... Continue Reading
-
Electronics outsourcing industry forecast, October
The electronics outsourcing industry, which includes both electronics manufacturing services(EMS) companies and original design... Continue Reading
-
Vonage’s virtual UK numbers confirm industry trend
Vonage will let UK callers call North American customers at local rates. Expect more such services, though regulatory and other... Continue Reading
-
PalmOne enhances Treo smartphone but challenges remain
PalmOne has improved the ergonomics and usability of its smartphone in the Treo 650. To realise strong enterprise sales, however,... Continue Reading
-
Despite EC decision, PeopleSoft’s future remains uncertain
The European Commission (EC) has removed the final antitrust obstacle to Oracle’s takeover offer for PeopleSoft. But the... Continue Reading
-
Many medicines but no cure for online ID theft
Banks and online retailers are struggling to protect their customers from criminals who covet their personal financial... Continue Reading
-
RFID poised to move beyond supply chain
Innovative uses of RFID technology promise benefits beyond improving efficiency in retail supply chains, providing issues of... Continue Reading
-
Security and integration burden AS400 managers
Single sign-on, security, heavy workload and constantly changing technical and business requirements are among the issues that... Continue Reading
-
In control of IT
The proportion of smaller businesses with an in-house IT manager is becoming smaller. The IT function is often now run by the... Continue Reading
-
Job market recovery blossoms
Figures for the third quarter prove that the recession in ITis definitely over and IT professionals looking for their next job... Continue Reading
-
More people use Tcl than know about it
If Tcl tickles your fancy, go for it - it is widely used for GUIs and integration Continue Reading
-
Understand how IT is perceived to get in synch with business needs
Get a better idea of what users expect Continue Reading
-
From manager to chief information officer
Moving into a company's top IT post requires a shift in focus, both organisationally and personally, from technology management... Continue Reading
-
Combined biometric ID card plan
The Home Office has abandoned plans to combine biometric national identity cards with passports and driving licences following... Continue Reading
-
Chinese authorities close 18,000 internet cafes
A high-profile government crackdown on internet cafes in China resulted in the temporary closure of 18,000 internet cafes between... Continue Reading
-
Outsourcing review will force firms to rethink risk
Many financial firms could struggle to meet international regulator's proposed guidelines Continue Reading
-
Use a carrot, not a stick on suppliers, says Yard
Former Inland Revenue IT director says incentives, not penalties, are key to success Continue Reading
-
A balanced workforce is a productive one
Women in IT The number of women working in IT is falling, but some organisations are recognising how to redress the balance by... Continue Reading
-
Companies seeks outsider’s opinion
Increasing data security threats are plain to see for most firms, and an increasing number are turning to penetration testing,... Continue Reading
-
Boost performance with a five-step plan
IT managers have become adept at cost-cutting during economic downturns, but initiatives for corporate expansion require a very... Continue Reading
-
Barbara Rembiesa, IAITAM president, talks about IT asset management
Barbara Rembiesa is president of the International Association of Information Technology Asset Managers (IAITAM), a for-profit... Continue Reading
-
Windows vs. Linux: Which has the better security tools?
Windows security expert Jonathan Hassell compares Windows and Linux security offerings in his first SearchWindowsSecurity.com column. While he says Windows is the easier operating system for him to use, he chooses Linux to keep his Web hosting ... Continue Reading
-
Network management by remote control
Managing dispersed networks and attached devices can be costly if you have to send staff out to make changes. So what can... Continue Reading
-
Microsoft focuses on apps modelling
Microsoft is looking to extend visual modelling of applications in its Visual Studio 2005 platform, with an early release of... Continue Reading
-
The right connections
Companies are turning to the web to run applications in the drive for greater flexibility and reduced costs, but many are unsure... Continue Reading
-
Microsoft stance on multicore licensing will help customers
Microsoft has decided not to charge additional license fees for multicore processor technology. This preemptive move will save... Continue Reading
-
New p5 high-end servers keep IBM ahead of the competition
IBM’s p5 590 and p5 595 complete the update of the POWER pSeries and iSeries to 64-way servers. Performance and pricing will make... Continue Reading
-
EMC targets SMB market with Dantz development
By acquiring Dantz, EMC aims to keep Veritas, Computer Associates and a raft of low-end backup vendors out of its growing... Continue Reading
-
RFID implants need better privacy protection
The US Federal Drug Administration (FDA) has approved a radio frequency identification (RFID) device for use in humans. But... Continue Reading
-
Cisco/Microsoft security pact promising but short on details
Customers need to request a clear road map detailing how Cisco Systems and Microsoft plan to implement their new security... Continue Reading
-
Charity IT leaders ramp up information sharing
IT governance, voice over IP, shared benchmarking and leadership were among the topics discussed at the Charities Consortium IT... Continue Reading
-
Four techniques that will become essential for securing growing IP-enabled networks
IP devices are creating a network architecture that demands better security Continue Reading
-
IT4C sets IT volunteer challenge
IT4Communities is looking to boost the number of registered IT volunteers from 2,200 to 2,500 by the organisation's second... Continue Reading
-
User groups challenge the era of IT consultants
A new age of self help among corporate IT users could end their reliance on external IT consultants, according to Michael Gough,... Continue Reading
-
Getting the green light from the board
In an extract from his book, Common Approach, Uncommon Results, Ian Gotts discusses managers' information overload and how to get... Continue Reading
-
Hot skills: Speed and flexibility of scripting languages suits web operations
Languages such as PHP are quick to learn and easy to use Continue Reading
-
Next move: Should I take admin role in the interim
I worked for two years as a software engineer writing C on Unix, but 18 months ago I was made redundant. While job hunting I have... Continue Reading
-
The threat from within: in-house security is business' Achilles' heel
Modern working practices can expose companies to attack Continue Reading
-
Shifting business demands place burden on IT
Dealing with shifting business demands will be the biggest challenge for UK IT directors over the next 12 months, according to a... Continue Reading
-
Concern grows over IT's ability to meet Freedom of Information Act data requests
With less than 10 weeks to go before the deadline for the Act, some IT departments are realising that neither they nor their... Continue Reading
-
Time to double up?
What are the fundamentals of 64-bit computing that your company needs to be aware of? Why should you consider moving away from... Continue Reading
-
Lighten up
Consolidation strategies can let you take best advantage from your servers. Antony Adshead explores how next generation servers... Continue Reading
-
Hit the highway
How will next-generation server technology evolve in order to support the new generation of mobile professionals? David Bicknell... Continue Reading
-
Counting the costs
Server technology is offering better price/performance ratios than previously. But what is the true cost of ownership of a next... Continue Reading
-
All systems go
The effectiveness of next generation servers is dependent on their operating systems. What are their strengths and weaknesses?... Continue Reading
-
Airbus UK
Airbus UK, an aircraft manufacturer, has reduced its costs by using an Intel Itanium-based high performance technical computing... Continue Reading
-
Your shout! On the increasing problem of spam
Have your say at computerweekly.com Continue Reading
-
Harrow installs central database to help make housing services more accessible
The London Borough of Harrow has installed a central database to help improve the way it runs council housing services. Continue Reading
-
Portsmouth shows bus times in real time
Portsmouth's Online Real Time Traveller Portal project, designed to encourage the use of public transport by displaying in real... Continue Reading
-
Intel prepares for next 20 years of chip making
Intel plans to continue making transistors smaller, faster, and less power-hungry using exotic materials such as carbon nanotubes... Continue Reading
-
Fine tune BPM to optimise business aims
enterprise software Business process optimisation can increase BPM's effectiveness, but only if you address the technology and... Continue Reading
-
Linux speared by trio of security holes
A series of security holes in three common Linux components has led open-source vendors to rush out several updates in just one... Continue Reading